×

Method and system for installing an application in a security element

  • US 10,481,887 B2
  • Filed: 11/20/2013
  • Issued: 11/19/2019
  • Est. Priority Date: 11/22/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for installing an application in a security element of a portable end device, the security element comprising its own hardware-based secure runtime environment and a secure memory that are separate from the portable end device, the method comprising the steps of:

  • receiving an installation job at a first installation device for installing the application on the security element, the installation job being provided to the first installation device from the security element, wherein the security element receives the application from an application server that is separate from the first installation device;

    checking at the first the received installation job to determine whether the received installation job can be executed by the first installation device without interaction with a second installation device;

    wherein upon determining that the received installation job can be executed by the first installation device, processing the installation job by the first installation device;

    wherein the first installation device receives the installation job from the security element or from a second security element different from the security element, andwherein upon determining that the received installation job cannot be executed by the first installation device without interaction with the second installation device, the first installation device interacts with the second installation device by relaying the installation job to the second installation device such that the application is installed on the security element by the second installation device to which the installation job was relayed, or by the first installation device requesting an installation authorization for carrying out the installation job from the second installation device,wherein the security element comprises a determination table which states when the first installation device can execute the installation job, and which states when the first installation device can interact with the second installation device to execute the installation job;

    wherein the security element uses the determination table to determine which of the first and second installation devices are to be involved in the execution of the installation job;

    wherein the first installation device can access the determination table of the security element in order to determine that the second installation device is suitable for interaction with the first installation device to execute the installation job; and

    wherein the first installation device and the second installation device are trusted service manager devices and the second installation device is separate from the first installation device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×